Русские видео

Сейчас в тренде

Иностранные видео


Скачать с ютуб How to Protect Data with Confidential Computing and Zero Trust | InTechnology | Intel в хорошем качестве

How to Protect Data with Confidential Computing and Zero Trust | InTechnology | Intel 1 месяц назад


Если кнопки скачивания не загрузились НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием, пожалуйста напишите в поддержку по адресу внизу страницы.
Спасибо за использование сервиса savevideohd.ru



How to Protect Data with Confidential Computing and Zero Trust | InTechnology | Intel

In this What That Means video, Camille talks with Ron Perez, Intel Fellow and Chief Security Architect for the Intel Office of the CTO. They get into the definitions of confidential computing and trusted execution environments, how data functions within those environments, how to make cloud computing more secure with confidential computing, using confidential computing to improve security without compromising user experience, and much more. Video originally published May 2022, when InTechnology was previously known as Cyber Security Inside. 0:00 Introductions 0:42 Ron’s role as Chief Security Architect 3:55 Biggest security threats on the horizon 5:47 Moving away from siloed networks 6:42 Confidential computing vs. zero trust 8:26 Securing data in use 9:51 Why homomorphic encryption is performance-intensive 11:02 Trusted execution environments 12:26 Intel Software Guard Extensions (SGX) 14:07 Why we need confidential computing and trusted execution environments for servers 16:10 Confidentiality, integrity, and availability 18:25 Protecting data in the cloud 20:35 Intel Trust Domain Extensions (TDX) & virtual machines (VMs) 24:47 Comparing TDX vs. SGX 27:34 When to use TDX or SGX 28:16 Wrap-up For more information, previous podcasts, and full versions, visit our website at https://intechnology.intel.com/ #confidentialcomputing #zerotrust #cloudcomputing The views and opinions expressed are those of the guests and author and do not necessarily reflect the official policy or position of Intel Corporation. If you are interested in emerging threats, new technologies, or best tips and practices in cybersecurity, please follow the InTechnology podcast on your favorite podcast platforms. Apple Podcast: https://podcasts.apple.com/il/podcast... Spotify: https://open.spotify.com/show/6RN4ATo... Follow our host Camille @morhardt on X:   / morhardt   Subscribe now to Intel on YouTube: https://intel.ly/3IX1bN2 About Intel: Intel, the world leader in silicon innovation, develops technologies, products and initiatives to continually advance how people work and live. Founded in 1968 to build semiconductor memory products, Intel introduced the world's first microprocessor in 1971. This decade, our mission is to create and extend computing technology to connect and enrich the lives of every person on Earth. Connect with Intel: Visit Intel WEBSITE: https://intel.ly/Intel Follow Intel on X: https://intel.ly/Twitter Follow Intel on INSTAGRAM: https://intel.ly/Instagram Follow Intel on LINKEDIN: https://intel.ly/LinkedIn Follow Intel on TIKTOK: https://intel.ly/TikTok How to Protect Data with Confidential Computing and Zero Trust | InTechnology | Intel    / intel  

Comments